Looking for breakthrough ideas for innovation challenges? Try Patsnap Eureka!

Self-owned post quantum key distribution method

A quantum key distribution and key technology, applied in the field of quantum communication, can solve the problems of data loss and tampering, not really storing data, deliberate deletion, modification, etc., to achieve the effect of improving efficiency

Inactive Publication Date: 2018-06-15
陈柱
View PDF3 Cites 5 Cited by
  • Summary
  • Abstract
  • Description
  • Claims
  • Application Information

AI Technical Summary

Problems solved by technology

However, while cloud computing brings convenience to users, it is difficult to guarantee the integrity and availability of data because users do not actually store data.
First of all, the cloud storage server will inevitably be attacked by the outside and inside, and there will be security problems such as data loss and tampering.
Secondly, cloud service providers may deliberately delete and change user data in order to obtain greater benefits
These problems will make it difficult to guarantee the integrity and availability of data. At the same time, in the traditional cloud storage system that supports dynamic operations, the calculation and communication overheads generated by the dynamic operations of dynamic files in the cloud are completely borne by users. Users bring corresponding computing and communication pressure

Method used

the structure of the environmentally friendly knitted fabric provided by the present invention; figure 2 Flow chart of the yarn wrapping machine for environmentally friendly knitted fabrics and storage devices; image 3 Is the parameter map of the yarn covering machine
View more

Image

Smart Image Click on the blue labels to locate them in the text.
Viewing Examples
Smart Image
  • Self-owned post quantum key distribution method
  • Self-owned post quantum key distribution method
  • Self-owned post quantum key distribution method

Examples

Experimental program
Comparison scheme
Effect test

Embodiment

[0024] Such as figure 1 As shown, a self-owned post-quantum key distribution method of an embodiment of the present invention is provided, the method includes steps S101-S103:

[0025] S101. Generate multiple keys: the sender uses a hash tree to generate multiple keys. When there are multiple public keys, the hash tree first calculates the public key Y i Get the initial hash value of the initial node, and then continue to calculate the hash value of the i-1th node of the initial node, the value pair of the i-1th node is the key X i , and then continue to calculate the hash value Y of the jth node j , the value pair of the j-1th node is the key X j , until only the hash value of the last node is left; if the public key of the jth node is Y j , then set the key X j and public key Y j is the key pair (X j , Y j );

[0026] The public key refers to the public key, which is stored at the sending end and the receiving end.

[0027] Hash tree (HashTree) is an ideal data stor...

the structure of the environmentally friendly knitted fabric provided by the present invention; figure 2 Flow chart of the yarn wrapping machine for environmentally friendly knitted fabrics and storage devices; image 3 Is the parameter map of the yarn covering machine
Login to View More

PUM

No PUM Login to View More

Abstract

The invention provides a self-owned post quantum key distribution method comprising the following steps: key generation: keys are generated by using a hash tree, and the hash tree calculates the initial hash value H(Yi) of a public key Yj and then calculates the hash value H(Yi-1) of a previous node until the hash value H(Y1) of the last node is left; signature generation: a signer selects a key pair (Xi, Yi), carries out Merkle signature on the key pair (Xi, Yi) through a one-time signature scheme, and sends additional information to Merkle to prove that Merkle is indeed a signed key; and signature verification: after receiving the Merkle-signed key pair (Xi, Yi), a receiver uses a public key Yi to verify whether the key pair (Xi, Yi) is signed by a one-time verification scheme. Computation can be reduced while the security of data is guaranteed. Therefore, the efficiency is improved.

Description

technical field [0001] The invention relates to the technical field of quantum communication, in particular to a self-owned post-quantum key distribution method. Background technique [0002] With the rapid development of cloud computing and big data, resource-constrained clients can outsource huge data to cloud servers, thereby reducing the client's overhead for maintaining local data. However, while cloud computing brings convenience to users, it is difficult to guarantee the integrity and availability of data because users do not actually store data. First of all, cloud storage servers will inevitably be attacked by the outside and inside, which will cause security problems such as data loss and tampering. Secondly, cloud service providers may deliberately delete and change user data in order to obtain greater benefits. These problems will make it difficult to guarantee the integrity and availability of data. At the same time, in the traditional cloud storage system tha...

Claims

the structure of the environmentally friendly knitted fabric provided by the present invention; figure 2 Flow chart of the yarn wrapping machine for environmentally friendly knitted fabrics and storage devices; image 3 Is the parameter map of the yarn covering machine
Login to View More

Application Information

Patent Timeline
no application Login to View More
Patent Type & Authority Applications(China)
IPC IPC(8): H04L9/08H04L9/06H04L9/32
CPCH04L9/0643H04L9/0825H04L9/0852H04L9/3247H04L67/1097
Inventor 陈柱
Owner 陈柱
Who we serve
  • R&D Engineer
  • R&D Manager
  • IP Professional
Why Patsnap Eureka
  • Industry Leading Data Capabilities
  • Powerful AI technology
  • Patent DNA Extraction
Social media
Patsnap Eureka Blog
Learn More
PatSnap group products